scholarly journals IMPLEMENTING CONTENT SHARING AND SESSION HAND-OFF BETWEEN WEB BROWSERS - An Integration of SIP Stack into Mozilla Firefox Web Browser

10.17158/177 ◽  
2011 ◽  
Vol 17 (2) ◽  
Author(s):  
Exander T. Barrios ◽  
Roñard C. Eman ◽  
Patrick Angelo P. Paasa

<p>This  study  aimed  to  create  a  consolidated  web  browser  interface  usingmultiple browser libraries for testing web designs. Specifically, this research effort intended to develop an application capable to test web designs on the top four (4) most commonly used web browsers namely, Mozilla Firefox, Google Chrome, Internet Explorer, and Safari. Furthermore, this research undertaking also meant to develop an application with syntax coloring and line numbers to help web developers determine syntax pairing and differences between browser outputs, and which would allow the users to directly edit specified CSS and HTML code through the text editor. Through experimental development approach and consultation with seventeen respondents who were selected through random sampling, the researchers were able to integrate the cited web browsers into one application enabling the web developers to avoid downloading and installing web browser applications one–by–one, and giving them the opportunity to test their web designs either online or offline. Findings revealed that the consolidated web browser interface using multiple browser libraries could help test web designs. The resulting program consolidated into one application the Mozilla Firefox, Google Chrome, Internet Explorer, and Safari, through the use of GeckoFX, WebKit, and XULRunner, making the browsers stand alone tools. In addition, RegEx and Line Numbers were also used for the syntax coloring and line numbering. Further, the consolidated web browser interface using multiple browser libraries for testing web designs could lessen the problem in following a certain standard code of a browser, especially HTML and CSS codes.</p>


2015 ◽  
Vol 12 (2) ◽  
pp. 757 ◽  
Author(s):  
Erkan Baran ◽  
Huseyin Çakır ◽  
Çelebi Uluyol

<p>Nowadays, web browser tools are seen ıntensıvely durıng the usage of web applıcatıons. Because of that, browsers provıdes ınfrastructure of a largo majorıty of crımes. Because guılty or suspect can use the browsers to collect ınformatıons, to hıde hıs crıme, learn new crımınal methods or to apply they have learned. In thıs study, ıt ıs also seeked answers of how a process can be monıtored on the computers whıch are used on browsers, ın whıch fıles whıch datas are looked and when and whıch sıtes are accessed. Accordıng to research of W3counter web stats tool, Chrome Web browser, whıch has %43 persentage of across the world ın usage, ıs proses as the most demanded browser ın thıs study by users, and ıt ıs scented out ın thıs browser's related fıles. In these days, ''hıdden mode'' whıch take part ın vast majorıty of browsers ıs also examıned. Thıs feature of the browser, whıch ıs receıved reference, ıs tracked by testıng and ıs sought data ın RAM memory and fıle systems. Thus, '' hıdden mode'' effects are dıscussed ın provıdıng studıes about suspect or crımınal posıtıon people, what kınd of data can be obtaıned ın usıng '' hıdden mode” ıs revealed.</p><p> </p><p><strong>Özet</strong></p><p>Günümüzde internet uygulamalarının kullanımı sırasında web tarayıcı araçlarının yoğun bir şekilde kullanımı görülmektedir. Bu nedenle tarayıcılar, işlenen suçların büyük bir çoğunluğuna altyapı sağlar. Çünkü suçlu ya da şüpheli, tarayıcıları bilgi toplamak, suçunu gizlemek, yeni suç metotları öğrenmek ya da öğrendiklerini uygulamak için kullanabilir.  Bu çalışmada da tarayıcıların kullanıldığı bilgisayarlar üzerinde bırakılan izlerin tespitinde nasıl bir süreç izlenebileceği, hangi dosyalarda hangi verilere bakılabileceği ve ne zaman hangi sitelere erişim sağlandığı gibi çeşitli sorulara cevaplar aranmaktadır. w3counter adlı internet istatistik aracının yaptığı araştırmaya göre, dünya genelinde %43'lük bir kullanım alanına sahip olan Chrome web tarayıcısı, kullanıcılar tarafından en çok talep gören tarayıcı olarak bu araştırma içinde referans alınmaktadır ve bu tarayıcıya ait ilgili dosyalarda izler sürülmektedir. Ayrıca günümüz tarayıcıların büyük bir çoğunluğunda yer alan “<strong>gizli mod</strong>” özelliği incelenmektedir.  Referans alınan tarayıcının bu özelliği test edilerek iz sürülmekte, dosya  sistemlerinde ve RAM bellekte veri aranmaktadır.Böylelikle “gizli mod” kullanımında ne tür veriler elde edilebileceği ortaya konarak şüpheli ya da suçlu konumundaki kişilere ait delillendirme çalışmalarında “gizli mod” kullanımının etkileri tartışılmaktadır. </p>


2015 ◽  
Vol 23 (3) ◽  
pp. 333-346 ◽  
Author(s):  
Swapan Purkait

Purpose – This paper aims to report on research that tests the effectiveness of anti-phishing tools in detecting phishing attacks by conducting some real-time experiments using freshly hosted phishing sites. Almost all modern-day Web browsers and antivirus programs provide security indicators to mitigate the widespread problem of phishing on the Internet. Design/methodology/approach – The current work examines and evaluates the effectiveness of five popular Web browsers, two third-party phishing toolbar add-ons and seven popular antivirus programs in terms of their capability to detect locally hosted spoofed websites. The same tools have also been tested against fresh phishing sites hosted on Internet. Findings – The experiments yielded alarming results. Although the success rate against live phishing sites was encouraging, only 3 of the 14 tools tested could successfully detect a single spoofed website hosted locally. Originality/value – This work proposes the inclusion of domain name system server authentication and verification of name servers for a visiting website for all future anti-phishing toolbars. It also proposes that a Web browser should maintain a white list of websites that engage in online monetary transactions so that when a user requires to access any of these, the default protocol should always be HTTPS (Hypertext Transfer Protocol Secure), without which a Web browser should prevent the page from loading.


2018 ◽  
Vol 17 ◽  
pp. 117693511877197 ◽  
Author(s):  
Richard Finney ◽  
Daoud Meerzaman

Chromatic is a novel web-browser tool that enables researchers to visually inspect genomic variations identified through next-generation sequencing of cancer data sets to determine whether such calls are, in fact, valid. It is the first cancer bioinformatics tool developed using WebAssembly technology, which comprises a portable, low-level byte code format that provides for the rapid execution of programs within supported web browsers. It has been designed expressly for ease of use by scientists without extensive expertise in bioinformatics.


2021 ◽  
Vol 4 (1) ◽  
pp. 16-19
Author(s):  
Mira Orisa ◽  
Michael Ardita

Aplikasi yang dibangun berbasis web rentan terhadap serangan. Setiap orang bisa terhubung dengan sebuah website melalui web browser seperti Mozilla firefox atau crome dan lainnya. Pada masa pendemi seperti saat ini banyak sekali masyarakat memanfaatkan internet sebagai media informasi. Pada umumnya penggunaan aplikasi web banyak dipakai oleh website e-banking, profil perusahaan, toko online,pemesanan tiket kereta api,sistem akademik kampus dan lain sebagainya. Kerentanan terjadi karena Banyak aplikasi web dirancang dari awal tanpa memperhitungkan masalah keamanan. Biasanya, aplikasi dirancang oleh orang yang tidak berpengalaman dalam bidang keamanan web.sehingga memungkinkan banyak celah keamanan dalam website mereka. Metode vulnerability assessment ini adalah cara terbaik saat ini untuk membantu pihak-pihak tertentu dalam menjaga keamanan aplikasi web mereka. Dengan melakukan vulneribility assessment dapat mengidentifikasi macam-macam celah yang memungkinkan masuknya serangan. Metode ini dapat membantu pihak-pihak tertentu untuk mengambil tindakan pencegahan terhadap serangan atau suatu kerusakan akibat kejahatan dunia maya. Network mapping atau dikenal dengan Nmap dapat membantu para master web untuk melakukan vulnerability assessment. Nmap bekerja optimal di system operasi linux. Banyak sekali fitur-fitur yang ditawarkan oleh Nmap yang dapat dimanfaatkan oleh master web. Dengan menggunakan Nmap dapat dilakukan pengecekan kerentanan pada otentikasi pengguna, kerentanan dari serangan denial of service, form upload dan mengecek bug.


2017 ◽  
Author(s):  
Timothy G. Vaughan

AbstractSummaryIcyTree is an easy-to-use application which can be used to visualize a wide variety of phylogenetic trees and networks. While numerous phylogenetic tree viewers exist already, IcyTree distinguishes itself by being a purely online tool, having a responsive user interface, supporting phylogenetic networks (ancestral recombination graphs in particular), and efficiently drawing trees that include information such as ancestral locations or trait values. IcyTree also provides intuitive panning and zooming utilities that make exploring large phylogenetic trees of many thousands of taxa feasible.Availability and ImplementationIcyTree is a web application and can be accessed directly at http://tgvaughan.github.com/icytree. Currently-supported web browsers include Mozilla Firefox and Google Chrome. IcyTree is written entirely in client-side JavaScript (no plugin required) and, once loaded, does not require network access to run. IcyTree is free software, and the source code is made available at http://github.com/tgvaughan/icytree under version 3 of the GNU General Public [email protected]


Web browsers may delete some files but it doesn’t delete everything. The purpose of private browsing is for users to browse private mode just as a standard browsing session would, but without storing any data such as log-in credentials or browsing history upon exit. A secure framework to secure the web browser artefacts is proposed to fulfil the requirements. In order to compare and contrast the different methods of artefacts encryption, a hybrid method was introduced; Base64 + AES on the prototype. The test systems were created by utilising virtual machines. The prototype was developed using C# language in Microsoft Visual Studio application that runs on Windows. To provide countermeasures, this research proposes an implementation of a third-party privacy application, called PRINDOW, to improve security in hiding a user's browsing activity. Every browsing session is recorded and scanned using the prototype. This method allows only the base requirements to be installed on the virtual machine for each file with the cryptographic method. This framework could theoretically enhance current practises by making slight changes to the web browser's application structure.


Author(s):  
J. Masó ◽  
A. Zabala ◽  
I. Serral ◽  
X. Pons

<p><strong>Abstract.</strong> Current map viewers that run on modern web browsers are mainly requesting images generated on the fly in the server side and transferred in pictorial format that they can display (PNG or JPEG). In OGC WMS standard this is done for the whole map view while in WMTS is done per tiles. The user cannot fine tune personalized visualization or data analysis in the client side. Remote sensing data is structured in bands that are visualize individually (manually adjusting contrast), create RGB combinations or present spectral indices. When these operations are not available in map browsers professional are forced to download hundreds of gigabytes of remote sensing imagery to take a good look at the data before deciding if it fits for a purpose. A possible solution is to create a web service that is able to perform these operations on the server side (https://www.sentinel-hub.com). This paper proposes that the server should communicate the data values to the client in a format that the client can directly process using two new additions in HTML5: canvas edition and array buffers. In the client side, the user can interact with a JavaScript interface changing symbolizations and doing some analytical operations without having to request any data again to the server. As a bonus, the user is able to perform queries to the data in a more dynamic way, applying spatial filters, creating histograms, generating animations of a time series or performing complex calculations among bands of the different loaded datasets.</p>


2019 ◽  
Vol 11 (7) ◽  
pp. 147 ◽  
Author(s):  
Masaki Kohana ◽  
Shinji Sakamoto ◽  
Shusuke Okamoto

Real-time web applications such as a virtual world require considerable computing resources. However, as the number of servers increases, so does the maintenance and financial cost. To share tasks among web browsers, the browsers must share data. Therefore, a network must be constructed among the web browsers. In this paper, we propose the construction of a web browser network based on the Barabasi–Albert model (BA model). We focus on a web-based multiplayer online game that requires higher frequent communication and significant computing resources. We attempt to optimize computing resource utilization for web browsers. We improve upon the method in our previous study, which constructed a network for a web-based virtual world, using only location information. When a new user logged into a world, the web browser connected to two other browsers whose users had a location close to that of the user. The experimental results of that method showed 50% data coverage, which was insufficient to display the game screen because the web browser displays the characters on the virtual world. In this study, we attempt to use the BA model to construct more efficient networks than those in the previous study to increase data coverage. Our new method uses the number of connections of the web browser and location information to calculate the probability of web browser selection. The experimental results show that the data coverage exceeds 90%, indicating significant improvement over the previous method.


Author(s):  
Michael Adeyeye

The cloud is becoming an atmosphere to store huge data and deploy massive applications. Using virtualization technologies, it is economical and feasible to provide testbeds in the cloud. The convergence of Next Generation (NG) networks and Internet-based applications may result in the deployment of future rich Internet applications and services in the cloud. This chapter shows the migration of mobility-enabled services to the cloud. It presents a SIP-based hybrid architecture for Web session mobility that offers content sharing and session handoff between Web browsers. The implemented system has recently evolved to a framework for developing different kinds of converged services over the Internet, which are similar to services offered by Google Wave and existing telephony Application Programming Interfaces (APIs). In addition, the work in this chapter is compared with those similar technologies. Lastly, the authors show efforts to migrate the SIP/HTTP application server to the cloud, which was necessitated by the need to include more functionalities (i.e., QoS and rich media support) as well as to provide large-scale deployment in a multi-domain scenario.


Sign in / Sign up

Export Citation Format

Share Document